BigW Consortium Gitlab

gitlab-ssl 5.2 KB
Newer Older
1 2 3 4
## GitLab
##
## Modified from nginx http version
## Modified from http://blog.phusion.nl/2012/04/21/tutorial-setting-up-gitlab-on-debian-6/
5
## Modified from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
6
##
7
## Lines starting with two hashes (##) are comments with information.
8
## Lines starting with one hash (#) are configuration parameters that can be uncommented.
9 10
##
##################################
11 12 13 14 15 16
##        CONTRIBUTING          ##
##################################
##
## If you change this file in a Merge Request, please also create
## a Merge Request on https://gitlab.com/gitlab-org/omnibus-gitlab/merge_requests
##
17
###################################
18
##         configuration         ##
19 20
###################################
##
21
## See installation.md#using-https for additional HTTPS configuration details.
22

23 24
upstream gitlab-workhorse {
  server unix:/home/git/gitlab/tmp/sockets/gitlab-workhorse.socket fail_timeout=0;
25
}
26

27 28 29 30 31
map $http_upgrade $connection_upgrade_gitlab_ssl {
    default upgrade;
    ''      close;
}

32
## Redirects all HTTP traffic to the HTTPS host
33
server {
34
  ## Either remove "default_server" from the listen line below,
35 36 37
  ## or delete the /etc/nginx/sites-enabled/default file. This will cause gitlab
  ## to be served if you visit any address that your server responds to, eg.
  ## the ip address of the server (http://x.x.x.x/)
38
  listen 0.0.0.0:80;
39
  listen [::]:80 ipv6only=on default_server;
40 41
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
  server_tokens off; ## Don't show the nginx version number, a security best practice
42
  return 301 https://$http_host$request_uri;
43 44
  access_log  /var/log/nginx/gitlab_access.log;
  error_log   /var/log/nginx/gitlab_error.log;
45 46
}

47
## HTTPS host
48
server {
49
  listen 0.0.0.0:443 ssl;
50
  listen [::]:443 ipv6only=on ssl default_server;
51
  server_name YOUR_SERVER_FQDN; ## Replace this with something like gitlab.example.com
52
  server_tokens off; ## Don't show the nginx version number, a security best practice
53 54

  ## Strong SSL Security
55
  ## https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html & https://cipherli.st/
56 57 58 59
  ssl on;
  ssl_certificate /etc/nginx/ssl/gitlab.crt;
  ssl_certificate_key /etc/nginx/ssl/gitlab.key;

60
  # GitLab needs backwards compatible ciphers to retain compatibility with Java IDEs
61
  ssl_ciphers "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
62 63 64
  ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
  ssl_prefer_server_ciphers on;
  ssl_session_cache shared:SSL:10m;
65
  ssl_session_timeout 5m;
66

67
  ## See app/controllers/application_controller.rb for headers set
68

69 70 71 72 73 74 75 76 77
  ## [Optional] If your certficate has OCSP, enable OCSP stapling to reduce the overhead and latency of running SSL.
  ## Replace with your ssl_trusted_certificate. For more info see:
  ## - https://medium.com/devops-programming/4445f4862461
  ## - https://www.ruby-forum.com/topic/4419319
  ## - https://www.digitalocean.com/community/tutorials/how-to-configure-ocsp-stapling-on-apache-and-nginx
  # ssl_stapling on;
  # ssl_stapling_verify on;
  # ssl_trusted_certificate /etc/nginx/ssl/stapling.trusted.crt;
  # resolver 208.67.222.222 208.67.222.220 valid=300s; # Can change to your DNS resolver if desired
78
  # resolver_timeout 5s;
79 80

  ## [Optional] Generate a stronger DHE parameter:
81
  ##   sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
82 83 84
  ##
  # ssl_dhparam /etc/ssl/certs/dhparam.pem;

85 86 87
  ## [Optional] Enable HTTP Strict Transport Security
  # add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";

88 89 90 91
  ## Real IP Module Config
  ## http://nginx.org/en/docs/http/ngx_http_realip_module.html
  real_ip_header X-Real-IP; ## X-Real-IP or X-Forwarded-For or proxy_protocol
  real_ip_recursive off;    ## If you enable 'on'
92 93
  ## If you have a trusted IP address, uncomment it and set it
  # set_real_ip_from YOUR_TRUSTED_ADDRESS; ## Replace this with something like 192.168.1.0/24
94

95 96 97 98 99
  ## Individual nginx logs for this GitLab vhost
  access_log  /var/log/nginx/gitlab_access.log;
  error_log   /var/log/nginx/gitlab_error.log;

  location / {
100
    client_max_body_size 0;
101 102 103 104 105 106 107 108
    gzip off;

    ## https://github.com/gitlabhq/gitlabhq/issues/694
    ## Some requests take more than 30 seconds.
    proxy_read_timeout      300;
    proxy_connect_timeout   300;
    proxy_redirect          off;

109
    proxy_http_version 1.1;
110

111
    proxy_set_header    Host                $http_host;
112 113 114 115
    proxy_set_header    X-Real-IP           $remote_addr;
    proxy_set_header    X-Forwarded-Ssl     on;
    proxy_set_header    X-Forwarded-For     $proxy_add_x_forwarded_for;
    proxy_set_header    X-Forwarded-Proto   $scheme;
116 117 118
    proxy_set_header    Upgrade             $http_upgrade;
    proxy_set_header    Connection          $connection_upgrade_gitlab_ssl;

119
    proxy_pass http://gitlab-workhorse;
120
  }
121 122 123 124 125

  error_page 404 /404.html;
  error_page 422 /422.html;
  error_page 500 /500.html;
  error_page 502 /502.html;
126 127
  error_page 503 /503.html;
  location ~ ^/(404|422|500|502|503)\.html$ {
128 129 130
    root /home/git/gitlab/public;
    internal;
  }
131
}